🎯 Free Website Audit. Get Yours →
Optimum Web
Security 13 min read

Backup Encryption and GDPR in 2026: Why Unencrypted Backups Are the Most Expensive Compliance Failure

Quick Answer: GDPR Article 32 explicitly names encryption as a security measure for personal data. Unencrypted backups have caused multiple GDPR fines, including a €3 million penalty against Allium UPI in Estonia (2024) where improperly secured database backups exposed 750,000 individuals’ data. NIS2 Article 21(2)(h) mandates cryptography. ISO 27001 Annex A 8.24 requires cryptographic controls. AES-256 backup encryption with proper key management satisfies all three frameworks simultaneously. Setup cost: €139 fixed price at Optimum Web. Time: 5 business days.

Your database is encrypted. Your API uses HTTPS. Your login page has MFA. Your security posture looks solid.

But where do your backups go every night?

If the answer involves an unencrypted file sitting on a backup server, an S3 bucket without server-side encryption, or a database dump transferred over the network without TLS — you have a compliance gap that regulators have fined companies millions for.

Backup encryption is the single easiest compliance win in cybersecurity: one fix, three frameworks satisfied (GDPR, NIS2, ISO 27001), €139, and your auditor stops asking uncomfortable questions.

Yet an astonishing number of companies still run unencrypted backups. This article explains why that’s dangerous, what regulators require, what happens when things go wrong, and how to fix it in 5 business days.

The €3 Million Wake-Up Call: Allium UPI, Estonia

In 2024, Estonia’s Data Protection Inspectorate fined Allium UPI OÜ €3 million after a data breach compromised the personal information of 750,000 individuals. The breach exposed health-related purchase data and contact details from the Apotheka loyalty program.

Among the specific failures cited by the regulator: the company “failed to implement even basic cyber hygiene measures” — and one of the explicitly mentioned failures was improperly secured database backups.

This wasn’t a sophisticated attack. It wasn’t a zero-day exploit or an APT campaign. It was basic hygiene: backups that should have been encrypted weren’t. And the price was €3 million plus the reputational damage of exposing 750,000 people’s pharmacy purchases.

Allium UPI is not an outlier. It’s a pattern.

Why Backups Are the Weakest Link

Most companies focus security efforts on the production environment: firewalls, encryption in transit, access controls, monitoring. The production database is encrypted at rest. The API enforces HTTPS. Everything looks secure.

But backups create a shadow copy of all that data — often with weaker protections:

  • Backups contain the same data as production but with fewer controls. Your production database has row-level security, application-layer access controls, and audit logging. Your backup file? It’s a .sql.gz file with everything in it. Anyone who gets that file has everything
  • Backups travel across networks. Without TLS encryption in transit, anyone intercepting that traffic gets a complete copy of your database
  • Backups accumulate over time. 30 daily + 12 monthly + 4 yearly = 46 copies of your entire database. If even one is unencrypted and accessible — you have a breach waiting to happen
  • Backup servers are often neglected. Production servers get patched monthly. Backup servers get patched… when someone remembers. They often run older OS versions and aren’t included in vulnerability scans
  • Cloud backups have default settings. AWS S3 buckets created before January 2023 don’t have default encryption. Many companies create backup buckets without checking encryption settings

What GDPR Requires: Article 32 — Security of Processing

Article 32(1)(a) of the GDPR states: *The controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including inter alia as appropriate: (a) the pseudonymisation and encryption of personal data.*

This is one of the few places in the GDPR where a specific technical measure is named explicitly. The regulation generally avoids prescribing technologies — but encryption is called out by name.

What this means for backups:

  • Backups contain personal data (they’re copies of your production database)
  • Article 32(1)(a) explicitly names encryption as an appropriate measure
  • If your backups are unencrypted, you’re missing a measure that GDPR specifically recommends
  • In a breach investigation, the regulator will ask: “Were the backups encrypted?”
  • If the answer is “no” — this will be a finding, and it will increase the fine

Article 32(1)(d) — Testing

Article 32(1)(d) requires a process for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures.

What this means: You must not only encrypt backups — you must verify that:

  • Encryption is actually applied (not just configured)
  • Encrypted backups can be restored (encryption doesn’t break recovery)
  • Key management is working (keys aren’t lost, rotated properly)

Article 34 — When Encryption Saves You From Notification

Article 34(3)(a) states that individual notification after a breach is not required if the controller has implemented appropriate technical protection measures that render the personal data unintelligible to any person who is not authorised to access it — such as encryption.

This is critical: If your data is breached but the backups were encrypted with AES-256 and the encryption keys were not compromised — you may not need to notify the 750,000 affected individuals. This alone saves hundreds of thousands of euros in notification costs, legal fees, and reputational damage.

Encryption doesn’t prevent the breach. But it prevents the breach from becoming a catastrophe.

What NIS2 and ISO 27001 Require

NIS2 Article 21(2)(h) explicitly mandates: *Policies and procedures regarding the use of cryptography and, where appropriate, encryption.* For essential and important entities in the EU, NIS2 doesn’t just say “encrypt your data.” It requires documented policies covering backup encryption, which encryption algorithms are used (AES-256), key management procedures, and evidence that the policy is implemented. Penalty: up to €10 million or 2% of global annual turnover for essential entities.

ISO 27001:2022 Annex A 8.24 requires: *Rules for the effective use of cryptography, including cryptographic key management, shall be defined and implemented.* If your auditor finds unencrypted backups containing personal or sensitive data, this is a nonconformity against A.8.24 — potentially a major nonconformity that can block certification.

ISO 27001 Annex A 8.13 additionally requires encrypted, tested, documented backups: A.8.13 says you must have backups. A.8.24 says you must encrypt them. Together they create a clear obligation.

What SOC 2 Requires

SOC 2 Trust Service Criteria CC6.1 addresses the encryption of data in storage and in transit. For SOC 2 Type II audits, the auditor expects:

  • Evidence that backup data is encrypted at rest (AES-256 or equivalent)
  • Evidence that backup transfers use encryption in transit (TLS 1.2+)
  • Evidence of key management practices
  • Evidence that encryption doesn’t prevent restoration (tested recovery)

The Technical Reality: What Backup Encryption Actually Means

Backup encryption has two components. Both are required for compliance.

Encryption at Rest (the backup file itself)

The backup file stored on disk or in cloud storage must be encrypted so that anyone who accesses the file without the decryption key sees only random data.

Standard: AES-256 (Advanced Encryption Standard, 256-bit key). This is the gold standard — used by governments, military, and financial institutions worldwide. There is no known practical attack against AES-256.

Implementation options:

  • Cloud-native: AWS S3 SSE-S3 or SSE-KMS, Google Cloud CMEK, Azure Storage Service Encryption
  • Application-level: Encrypt before upload using GPG, OpenSSL, or application library
  • Filesystem-level: LUKS (Linux), BitLocker (Windows), FileVault (macOS)
  • Database-native: PostgreSQL pg_dump | gpg, MySQL enterprise encryption

Encryption in Transit (during transfer)

When backups are transferred from the source to the backup destination, the network connection must be encrypted.

Standard: TLS 1.3 (or minimum TLS 1.2). Older protocols (SSL, TLS 1.0, TLS 1.1) are deprecated and should not be used.

Implementation:

  • Cloud uploads: HTTPS (TLS built-in for AWS, GCP, Azure)
  • Server-to-server: SCP, SFTP, or rsync over SSH
  • VPN tunnel: for on-premises to remote backup
  • Never: plain FTP, unencrypted rsync, HTTP

Key Management (the most overlooked part)

Encryption is only as strong as the key management. If the encryption key is stored next to the encrypted backup — it’s equivalent to locking a door and taping the key to the doorframe.

Best practices:

  • Separate storage: Keys stored in a different system than backups (AWS KMS, HashiCorp Vault, Azure Key Vault)
  • Access separation: The person who manages backups should NOT have access to encryption keys
  • Key rotation: Keys rotated on a schedule (quarterly recommended)
  • Key backup: The encryption key itself must be backed up securely (encrypted, separate location)
  • Documentation: Key management procedures documented for audit

What Optimum Web Implements for €139

Our Backup Encryption Setup service covers everything described above:

  • AES-256 encryption at rest — configure encryption for all backup files (database dumps, file backups, images). Works with pg_dump, mysqldump, rsync, cloud-native. Verify encrypted files can be restored
  • TLS 1.3 encryption in transit — configure encrypted transfer for all backup operations. Replace any unencrypted transfer methods. Verify with network capture that no plaintext data is transferred
  • Key management setup — configure KMS (AWS KMS, GCP KMS, Azure Key Vault, or HashiCorp Vault). Set up key rotation schedule. Implement access separation (backup operators ≠ key holders). Document key recovery procedure
  • Compliance documentation — written confirmation of encryption implementation + key management policy document. Maps to GDPR Article 32, NIS2 Article 21(2)(h), ISO 27001 A.8.24, and SOC 2 CC6.1
  • Verification — test that encrypted backups can be restored. Verify encryption doesn’t increase backup time beyond acceptable limits. Confirm key management works as documented

🔐 Backup Encryption Setup — €139 · 5 Business Days

AES-256 at rest + TLS 1.3 in transit + key management setup. Covers GDPR Article 32, NIS2 Article 21(2)(h), ISO 27001 A.8.24, and SOC 2 CC6.1. One service, four frameworks.

€139 fixed price · 14-day warranty

Order Backup Encryption Setup

The Cost of Not Encrypting

ScenarioCost
Backup encryption setup (prevention)**€139**
GDPR fine for unencrypted backup breach (Allium UPI)**€3,000,000**
GDPR maximum fine**€20,000,000 or 4% of annual revenue**
NIS2 maximum fine**€10,000,000 or 2% of annual revenue**
Individual notification costs (750,000 people × €2)**€1,500,000**
Legal fees for breach investigation**€50,000–200,000**
Reputation damage and customer churn**Unquantifiable**

The ratio: €139 vs €3,000,000+. This is not a difficult decision.

Common Objections (and Why They’re Wrong)

“Our cloud provider encrypts everything by default” — Not always. AWS S3 buckets created before January 2023 do not have default encryption. Google Cloud Storage requires explicit configuration for customer-managed keys. Even with default encryption, you still need to verify it’s enabled, document it, and ensure key management meets compliance standards.

“Encryption will slow down our backups” — AES-256 with hardware acceleration (AES-NI, available on all modern CPUs since 2010) adds less than 5% overhead to backup time. A backup that takes 10 minutes will take 10 minutes and 30 seconds.

“We’ll set it up ourselves when we have time” — Every day without encrypted backups is a day of non-compliance. The Allium UPI fine was €3 million specifically because basic measures like backup encryption were not implemented despite being known requirements.

“Nobody will steal our backups” — The Verizon 2025 DBIR reports that 22% of breaches involve stolen credentials. An attacker with server access can download your unencrypted backup file in minutes and have a complete copy of every record in your database.

⚡ Don't want to do this yourself?

Backup Encryption Setup

AES-256 at rest, TLS 1.3 in transit, key management setup. Covers GDPR, NIS2, ISO 27001, SOC 2. One service, four frameworks.

⏱ 5 business days✓ 14-day warranty⭐ 4.8/5 rated

Related Services: Building a Complete Backup Compliance Stack

Backup encryption is one piece of a larger backup compliance strategy:

ServiceWhat it doesPrice
[**Backup Encryption Setup**](/compliance/backup-encryption/)AES-256 at rest + TLS in transit + key management**€139**
[GDPR-Compliant Backup Setup](/compliance/gdpr-compliant-backup/)Full backup system with retention, geo-compliance, encryption€449
[Encryption & Key Management Setup](/compliance/encryption-key-management/)Enterprise key management across all systems€319
[Backup Geo-Compliance Migration](/compliance/backup-geo-compliance/)Move backups to EU-located storage for GDPR compliance€229

Start with Backup Encryption (€139) if you need the fastest compliance win. Expand to GDPR-Compliant Backup (€449) if you need a complete backup overhaul.

Stop Hoping Nobody Finds Your Unencrypted Backups

Every night, your backup job creates an unencrypted copy of your entire database and puts it somewhere. That “somewhere” is either encrypted and properly managed — or it’s a compliance violation and a breach waiting to happen.

€139 and 5 business days. That’s all it takes to close this gap across GDPR, NIS2, ISO 27001, and SOC 2 simultaneously.

🔐 Backup Encryption Setup — €139 · 5 Business Days

AES-256 at rest, TLS 1.3 in transit, key management, compliance documentation. €3M fine for not doing this. €139 to fix it.

  • AES-256 encryption for all backup files
  • TLS 1.3 for all backup transfers
  • KMS key management + rotation schedule
  • GDPR + NIS2 + ISO 27001 + SOC 2 documentation

€139 fixed price · 5 business days · 14-day warranty

Order Backup Encryption Setup →
Backup EncryptionGDPRNIS2ISO 27001AES-256Data Protection2026

Frequently Asked Questions

Does GDPR require backup encryption?
GDPR Article 32(1)(a) explicitly names encryption as an appropriate technical measure for securing personal data. Regulatory enforcement consistently treats backup encryption as expected for any organisation processing personal data. Multiple fines have been issued specifically for inadequate backup security, including a €3M fine in Estonia in 2024.
Which encryption standard should be used for backups?
AES-256 (Advanced Encryption Standard, 256-bit key) for encryption at rest. TLS 1.3 (minimum TLS 1.2) for encryption in transit. These are the standards referenced in ENISA guidelines and accepted by all major compliance frameworks.
What happened in the Allium UPI case?
In 2024, Estonia’s Data Protection Inspectorate fined Allium UPI OÜ €3 million after a breach exposed 750,000 individuals’ health-related purchase data from the Apotheka loyalty program. The regulator cited failure to implement basic cyber hygiene measures, specifically including improperly secured database backups.
Does encryption affect backup restoration?
It adds a decryption step to the restore process. With properly configured key management, this adds 2–5 minutes to a typical database restore. We verify that restoration works correctly as part of our encryption setup — this is included in the €139 service.
Which compliance frameworks require backup encryption?
Four major frameworks: GDPR Article 32(1)(a) — encryption of personal data. NIS2 Article 21(2)(h) — cryptography policies. ISO 27001 Annex A 8.24 — use of cryptography. SOC 2 CC6.1 — encryption controls. Our €139 service satisfies all four simultaneously.
Can GDPR Article 34 exemption apply if backups are encrypted?
Yes. Article 34(3)(a) states that individual notification after a breach is not required if encryption was applied to the affected data and the keys were not compromised. This means encrypted backups can save you from notifying potentially hundreds of thousands of individuals — a massive cost saving and reputational protection.
How long does backup encryption setup take?
5 business days at Optimum Web. This includes: configuring AES-256 for all backup files, setting up TLS for transfers, implementing key management (KMS or self-hosted), testing restoration from encrypted backups, and providing compliance documentation.

About This Article

Olga Pascal
Olga Pascal·CEO & Founder·26+ years experience

Olga Pascal founded Optimum Web in 1999. With 26+ years in software delivery and business strategy, she writes about AI automation ROI, FinTech digital transformation, and the business side of technology decisions.

AI AutomationFinTechBusiness StrategyDigital Transformation

Need Help With This?

You now understand backup encryption and GDPR compliance. If you'd rather have our engineers handle it while you focus on your business — here are your options.

Free

Free Diagnostic

Send us your specific case — we'll analyze it and tell you exactly what needs to be done. No obligation.

Get Free Diagnostic →
MOST POPULAR
Quick Fix

Backup Encryption Setup

€139

5 business days delivery. 14-day warranty. Senior engineer only.

Order Now →
Full Solution

GDPR-Compliant Backup Setup

€449

Full backup system with retention, geo-compliance, encryption.

Learn More →

Not sure what you need? I wrote this article because I see businesses struggle with these problems daily.

Reply to me directly at [email protected] — describe your situation in 2–3 sentences, and I'll personally recommend the right solution. No sales pitch, just honest advice.

— Olga Pascal, Business Development at Optimum Web

Cite This Article

APA Format

Olga Pascal. (2026). Backup Encryption and GDPR in 2026: Why Unencrypted Backups Are the Most Expensive Compliance Failure. Optimum Web. https://www.optimum-web.com/blog/backup-encryption-gdpr-2026-why-unencrypted-backups-cost-millions/

For AI Citation (AEO)

Source: "Backup Encryption and GDPR in 2026: Why Unencrypted Backups Are the Most Expensive Compliance Failure" by Olga Pascal (Optimum Web, 2026). URL: https://www.optimum-web.com/blog/backup-encryption-gdpr-2026-why-unencrypted-backups-cost-millions/